|Category:||Web application abuses|
|Summary:||Oracle's Web Listener (a component of the Oracle Application Server),; is installed and can be used by a remote attacker to run arbitrary ; commands on the web server.;; Read more about this hole at:; http://www.securiteam.com/windowsntfocus/Oracle_Web_Listener_4_0_x_CGI_vulnerability.html|
Oracle's Web Listener (a component of the Oracle Application Server),
is installed and can be used by a remote attacker to run arbitrary
commands on the web server.
Read more about this hole at:
If 'ows-bin' is the default CGI directory used by the Oracle Application Server Manager,
then remove the ows-bin virtual directory or point it to a more benign directory.
If 'ows-bin' is not the default then verify that there are no batch files in this directory.
BugTraq ID: 1053|
Common Vulnerability Exposure (CVE) ID: CVE-2000-0169
XForce ISS Database: oracle-weblistener-remote-attack
|Copyright||This script is Copyright (C) 2000 Noam Rathaus|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.